From eb13215dea6734a5a605d54fcc04d33976c1c793 Mon Sep 17 00:00:00 2001 From: Alexander Fisher Date: Thu, 5 Dec 2019 15:42:17 +0000 Subject: [PATCH] Treat keys file content as Sensitive This file contains unencrypted shared secrets. Using `Sensitive` will stop changes being logged, and exposed in puppetDB etc. --- README.md | 2 +- manifests/config.pp | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index f8998d0..559b368 100644 --- a/README.md +++ b/README.md @@ -304,7 +304,7 @@ Force chrony to only use RAM & prevent swapping. ## Limitations -This module has been built on and tested against Puppet 3.2.3 and higher. +This module has been built on and tested against Puppet 5.5 and higher. The module has been tested on: * Arch Linux diff --git a/manifests/config.pp b/manifests/config.pp index 67a3c7c..a6d8695 100644 --- a/manifests/config.pp +++ b/manifests/config.pp @@ -41,7 +41,7 @@ owner => $config_keys_owner, group => $config_keys_group, mode => $config_keys_mode, - content => template($config_keys_template), + content => Sensitive(template($config_keys_template)), } }